Sciweavers

136 search results - page 24 / 28
» Strong price of anarchy
Sort
View
ATAL
2004
Springer
14 years 3 months ago
Coordinating Multiple Concurrent Negotiations
To secure good deals, an agent may engage in multiple concurrent negotiations for a particular good or service. However for this to be effective, the agent needs to carefully coor...
Thuc Duong Nguyen, Nicholas R. Jennings
QOFIS
2001
Springer
14 years 2 months ago
Affordable QoS in Future Wireless Networks: Myth or Reality?
– Future wireless access system will have features and requirements that are quite distinct form current systems, mostly designed for telephony. Such features include higher band...
Jens Zander
HICSS
2000
IEEE
144views Biometrics» more  HICSS 2000»
14 years 2 months ago
Diffusion Follows Structure - A Network Model of the Software
By conducting simulations, we show that the structure of the personal networks significantly influences the diffusion processes in network effect markets like the software market....
Falk von Westarp, Oliver Wendt
BMCBI
2007
167views more  BMCBI 2007»
13 years 10 months ago
Applying negative rule mining to improve genome annotation
Background: Unsupervised annotation of proteins by software pipelines suffers from very high error rates. Spurious functional assignments are usually caused by unwarranted homolog...
Irena I. Artamonova, Goar Frishman, Dmitrij Frishm...
CHES
2009
Springer
140views Cryptology» more  CHES 2009»
14 years 10 months ago
On Tamper-Resistance from a Theoretical Viewpoint
Tamper-proof devices are pretty powerful. They can be used to have better security in applications. In this work we observe that they can also be maliciously used in order to defea...
Paulo Mateus, Serge Vaudenay